ATLANTA, Sept. 20, 2013 (GLOBE NEWSWIRE) -- Equifax Inc. (NYSE:EFX), a leading provider of identity authentication services and fraud mitigation solutions, announces the expansion of risk-based authentication capabilities within the Identity and Fraud product suite.
Trends show that businesses want to improve the end user experience and reduce intrusive authentication methods while still maintaining security for online transactions and reducing fraud. A risk-based strategy that can segment safer transactions from riskier ones allows businesses a flexible way to balance risk, consumer friction, and cost. Our risk-based technology includes pattern and velocity detection, device recognition and risk score, and financial account validation, among other criteria. These risk factors combine within automated transactional decisioning to give business a workflow that challenges users with the most appropriate authentication based on the risk presented by the person, their location, and the task.
"There is a tremendous need in the marketplace to help fight fraud and manage risk in both the private and public sector," said Rajib Roy, President, Equifax Identity and Fraud Solutions (IFS). Mr. Roy is responsible for global fraud strategy and product development for IFS incorporating unique data, intellectual property, and proprietary technology.Leading analysts have called for a layered security model to protect against fraud, account take over, and loss. Equifax Identity and Fraud Solutions implement this model by providing multi-layered security and fraud mitigation that performs in the background to assess risk during enrollment, account maintenance, and ongoing transactional activity. Customers are not limited to their own experience with a user, but have the advantage of risk assessment across the Equifax network which can help identify actual or potential bad actors. "We believe that risk-scoring combined with validation of the components of an individual's identity allows the most judicious use of more intrusive authentication methods," continued Mr. Roy. "Strong authentication methods need to be used appropriately in order to maintain a good user experience – especially in competitive businesses. However, we also see that "silent" risk assessment helps identify previously unknown risks, and changes in risk situations that might have previously been deemed low-risk and so not secured with a stepped-up authentication challenge."